Academic literature on the topic 'Information systems philosophy, research methods and theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information systems philosophy, research methods and theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information systems philosophy, research methods and theory"

1

Li, Guowu. "Information Philosophy in China: Professor Wu Kun’s 30 Years of Academic Thinking in Information Philosophy." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (October 30, 2011): 316–21. http://dx.doi.org/10.31269/triplec.v9i2.279.

Full text
Abstract:
Professor Wu Kun, from Xi'an Jiaotong University of China, has been studying information philosophy for 30 years. He thinks information conception is one of the most fundamental areas in philosophy and has founded information philosophy. He has done original and pioneering research in information ontology, epistemology, social information theory, information production theory, information evolution theory, information value, and information thinking directions. He is the first scholar to develop a completely new view of theories, systems, and methods about information philosophy.
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Guowu. "Information Philosophy in China: Professor Wu Kun’s 30 Years of Academic Thinking in Information Philosophy." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (October 30, 2011): 316–21. http://dx.doi.org/10.31269/vol9iss2pp316-321.

Full text
Abstract:
Professor Wu Kun, from Xi'an Jiaotong University of China, has been studying information philosophy for 30 years. He thinks information conception is one of the most fundamental areas in philosophy and has founded information philosophy. He has done original and pioneering research in information ontology, epistemology, social information theory, information production theory, information evolution theory, information value, and information thinking directions. He is the first scholar to develop a completely new view of theories, systems, and methods about information philosophy.
APA, Harvard, Vancouver, ISO, and other styles
3

Breu, Karin, and Joe Peppard. "Useful Knowledge for Information Systems Practice: The Contribution of the Participatory Paradigm." Journal of Information Technology 18, no. 3 (September 2003): 177–93. http://dx.doi.org/10.1080/0268396032000122141.

Full text
Abstract:
Information systems research has become methodologically pluralistic, not least in the hope of achieving greater relevance of scholarly output to practice. Although interventionist approaches have considerable potential for bridging the theory–practice gap, they are dismissed as unscientific because of the purported absence of a philosophical foundation that would justify the interactive research process and the co-productive relationships between researchers and practitioners that are so defining of this type of inquiry. The intention in this paper is to demonstrate that philosophical foundations for interventionist research strategies do exist. This task is pursued by the introduction of the participatory worldview, as articulated in the fields of sociology, philosophy and organization studies. The paper shows its distinctness to other, non-positivist paradigms, describes the participatory research process, presents participatory inquiry methods and extrapolates the distinctness of the knowledge they produce. The application of its paradigmatic principles is illustrated through an empirical example of a participatory research programme and the challenges that this approach presents for research practice are indicated. … most of our knowledge, and all our primary knowledge, arises as an aspect of activities that have practical, not theoretical objectives; and it is this knowledge, itself an aspect of action, to which all reflective theory must refer. (Macmurray, 1957, p. 12)
APA, Harvard, Vancouver, ISO, and other styles
4

Lea French, Rebecca, and Kirsty Williamson. "The information practices of welfare workers." Journal of Documentation 72, no. 4 (July 11, 2016): 737–54. http://dx.doi.org/10.1108/jdoc-08-2015-0100.

Full text
Abstract:
Purpose – The purpose of this paper is to explore the nature of information practices of welfare workers and how they fit into daily work of welfare work within a small community sector organisation in Victoria, Australia. Design/methodology/approach – The study was constructivist (interpretivist) in its underpinning philosophy, drawing on both personal constructivist and social constructionist theories. The research methods used, with a sample of 14 welfare workers and two clients, were organisational ethnography and grounded theory. Data collection techniques were interview and participant observation, along with limited document analysis. Data analytic techniques, drawn from grounded theory method, provided a thorough way of coding and analysing data, and also allowed for the development of theory. Findings – Key findings centre on the role of information in welfare work. Welfare workers mostly used resources to hand, “making do” with resources they already had rather than seeking new ones. They also recombined or re-purposed existing resources to make new resources or to suit new circumstances. Their information practices were found to be fluid, consultative and collaborative. The findings of the research have led to a deep exploration of bricolage as a way to describe both the use of resources and the processes inherent in welfare worker information practices. Originality/value – The fact that there is a paucity of research focused on information practices of welfare workers in Australia makes the research significant. The bricolage theoretical framework is an original contribution which has implications for exploring other groups of workers and for the design of information systems and technology.
APA, Harvard, Vancouver, ISO, and other styles
5

Zeynali-Tazehkandi, Mahdi, and Mohsen Nowkarizi. "A Dialectical Approach to Search Engine Evaluation." Libri 70, no. 3 (September 25, 2020): 227–37. http://dx.doi.org/10.1515/libri-2019-0142.

Full text
Abstract:
AbstractEvaluation of information retrieval systems is a fundamental topic in Library and Information Science. The aim of this paper is to connect the system-oriented and the user-oriented approaches to relevant philosophical schools. By reviewing the related literature, it was found that the evaluation of information retrieval systems is successful if it benefits from both system-oriented and user-oriented approaches (composite). The system-oriented approach is rooted in Parmenides’ philosophy of stability (immovable) which Plato accepts and attributes to the world of forms; the user-oriented approach is rooted in Heraclitus’ flux philosophy (motion) which Plato defers and attributes to the tangible world. Thus, using Plato’s theory is a comprehensive approach for recognizing the concept of relevance. The theoretical and philosophical foundations determine the type of research methods and techniques. Therefore, Plato’s dialectical method is an appropriate composite method for evaluating information retrieval systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Adriaenssen, Daniel Joh, and Jon-Arild Johannessen. "Developing a general scientific methodology on tenets from Mario Bunges philosophy." Kybernetes 45, no. 4 (April 4, 2016): 622–36. http://dx.doi.org/10.1108/k-02-2015-0039.

Full text
Abstract:
Purpose – The purpose of this paper is to present a general scientific methodology on tenets from Mario Bunge’s philosophy. Design/methodology/approach – Systemic thinking and conceptual generalisation. Findings – A general scientific methodology based on tenets from Mario Bunge’s philosophy of social science. Research limitations/implications – Using quantitative methods to conduct a research to test Asplunds motivation theory and North’s action theory. Practical implications – How to conduct a research based on a systemic perspective. Social implications – An advantage of linking a systemic perspective to organisational psychology studies is that it may result in new ways of looking at old problems and bring new perspectives to the methods used. One explanation may be the fact that while researchers within various organisational psychology subject fields are largely specialists, the systemic perspective is oriented towards general scientific methodology. Originality/value – The authors have not seen anybody who have tried to apply systemic thinking as a general methodology for research.
APA, Harvard, Vancouver, ISO, and other styles
7

Shevchenko, Svitlana, Pavlo Skladannyi, Olena Nehodenko, and Vitalii Nehodenko. "STUDY OF APPLIED ASPECTS OF CONFLICT THEORY IN SECURITY SYSTEMS." Cybersecurity: Education, Science, Technique 2, no. 18 (2022): 150–62. http://dx.doi.org/10.28925/2663-4023.2022.18.150162.

Full text
Abstract:
The problem of conflicts and conflict situations has always been in the center of attention of scientists, first of all, sociologists. However, the current state of these theories includes a large number of currents in various fields of knowledge. We meet them in history, philosophy, psychology, jurisprudence, biology, medicine, pedagogy, cultural studies, economics, military affairs, technical systems, in particular in security and cyber security systems. In addition, there are attempts to apply a mathematical apparatus for modeling and solving certain issues in the decision-making process. This determines the relevance of this study, which is devoted to the analysis of ways of introducing the theoretical foundations of the theory of conflicts into the information security system. The article analyzes the views of scientists regarding the application of conflict theory in various sciences and disciplines. A review of literary sources in the context of the theory of conflicts in information systems was carried out, the definition of "information conflict" and its characteristics were highlighted. It is justified to carry out research through the interaction of the planes of the theory of conflict theory and the theory of information and cybernetic security in three perspectives: "subject - subject" or "person - person"; "subject - object" or "man - machine"; "object - object" or "machine - machine". To determine the main characteristics of conflicts in security systems, the general structure and stages of conflicts were highlighted. The structure of conflicts in security systems includes the definition of boundaries; state and activity variables; causal relationships and feedback; several interconnected subsystems; conflict delay (or conflict resolution). The following stages are distinguished in the dynamics of the conflict: emergence of a conflict situation; latent stage; active stage; stage of ending the conflict. In the process of conflict management in information security, the opportunity to apply analytical methods is outlined: differential equations, decision-making theory, operations research, and game theory. This study is an introduction to the theory of conflicts in security systems and can be used in the educational process of students of the specialty 125 Cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
8

Nahotko, Marek. "Application of Interdisciplinary Theory of Genres in LIS." Zagadnienia Informacji Naukowej - Studia Informacyjne 58, no. 1A(115A) (November 20, 2020): 57–74. http://dx.doi.org/10.36702/zin.723.

Full text
Abstract:
Purpose/Thesis: The article presents the possibilities of using the interdisciplinary theory of genres, developed in the study of linguistics, literary studies, rhetoric, sociology, philosophy, psychology and other disciplines, in library and information science (LIS). The article argues the application of genre theory to LIS offers a new and interesting interdisciplinary perspective.Approach/Methods: A critical analysis of the literature on the subject introduces the basic premises of the interdisciplinary theory of text/information genres in its historical development in the world and in Poland. A similar method was used to present the most important directions genre theory opens to LIS.Results and conclusions: Before genre theory was first applied to LIS, it was developed in disciplines such as linguistics, literature, rhetoric, communication and media, discourse analysis, sociology, pedagogy and others and in many countries on all continents (mainly in the USA, Australia, Brazil and Scandinavian countries). The theory’s success is a result of its interdisciplinary development, beginning from linguistic and classical rhetorical genres approach and problems of categorizing texts to “de facto genres” and their function in everyday communication activities (social/rhetoric approach). Applied to LIS, it frames information objects as social constructs whose meaning is constructed in social discourse, driven by genre knowledge. The library and other information systems should be treated as a social communication activity in the recurrent situation of organizing and retrieving information. It means that the work of a librarian (or other information organizers) involves rhetorical activity of creating information objects, as does the work of other information creators, e.g. authors of scholarly publications. The functioning of information system, i.e. production and organization of textual information should be investigated using methods applied in other disciplines, especially humanities and social sciences, as it allows for a broader research perspective.Originality/Value: The article describes the possibilities of applying genre theory in LIS research, which still do not receive the attention they merit. A wider knowledge of the genre theory would make possible collaborative research involving scholars of other disciplines such as linguistics and sociology.
APA, Harvard, Vancouver, ISO, and other styles
9

Adriaenssen, Daniel J., and Jon-Arild Johannessen. "Paradigms in information science." Kybernetes 45, no. 1 (January 11, 2016): 51–69. http://dx.doi.org/10.1108/k-01-2015-0028.

Full text
Abstract:
Purpose – The purpose of this paper is the conceptual expansion of the science-theoretical foundations of information science, i.e. to develop new thought schemes for information science. Design/methodology/approach – The design of the paper is as follows: first, the paper will discuss the foundation of the systemic paradigm (SP). Then the authors will consider the history of information science related to the philosophy of science. In the remaining part of the paper, the authors will investigate information science and its relation to the philosophy of science, focusing on SP. Findings – In conclusion, the authors will summarise the seven criteria for the application of SP in information science. Research limitations/implications – Paradigms in information science have rarely reflected upon the use of a SP in information science. Practical implications – The practical use of the seven criteria in information science Criterion 1: make your premises, suppositions, prerequisites and motives explicit. Criterion 2: make your moral/ethical results and consequences explicit. Criterion 3: research should be evaluated in relation to the transcendence of knowledge. Criterion 4: emphasise methodical pluralism, i.e. empirical generalisations and conceptual generalisations. Criterion 5: emphasise proximity and in-depth studies. Criterion 6: look for patterns and patterns which combine. Criterion 7: look for the power behind the patterns. Social implications – The opinion is that scientists to a great extent should seek knowledge on the basis of a belief, a specific way of thinking, and by means of specific methods. To make the authors belief explicit makes the way of thinking visible. What the authors achieve, and possibly the only thing the authors can achieve, is to reaffirm the conscious belief. This does not make reality more real, but it could put the authors in a better position to see through the authors way of thinking when faced with scientific problems. This indicates that a scientific study should emphasise all three entities: “The Context of Discovery”, “The Context of Justification” and “The Context of Solution”. These three entities, according to SP, make up the unity of the scientific process. Originality/value – The seven criteria entail that Kuhn’s argumentative chain (where he tries to find out why theory A is preferred to theory B on a rational pretext) does not concur with SP. This indicates that a scientific study should emphasise all three entities: “The Context of Discovery”, “The Context of Justification” and “The Context of Solution”. These three entities, according to SP, make up the unity of the scientific process.
APA, Harvard, Vancouver, ISO, and other styles
10

Pushkar, Mikhail. "The concept of the information field in the development of accounting science." Herald of Economics, no. 1 (June 1, 2022): 143. http://dx.doi.org/10.35774/visnyk2022.01.143.

Full text
Abstract:
Introduction. According to T. Kuhn’s theory of scientific revolutions, there are tendencies in modern accounting normative knowledge that lead to the accumulation of contradictions between the achievements of information sciences and imperfect practice of obtaining information resources for business. This indicates the need to develop a new accounting paradigm for the needs of post-industrial society.Goal is to develop a new concept of accounting science, in which the central place should belong to the theoretical basis formed on the basis of laws of philosophy, sociology, information theory, management theory, psychology, systems theory, expanding methods of collecting and processing business facts past, present, future position of the enterprise in a rapidly changing environment and adaptation to change, which contributes to its long- term existence.Research methods. The article uses not only those methods that are traditionally inherent in accounting, but also those borrowed from other sciences in order to expand the methodological apparatus of research accounting problems - the laws of dialectics, logic, historical and systematic methods, analysis, synthesis and more. The choice of methods involves the creation of the concept of management accounting based on the disclosure of the category of «information field» of the enterprise, which helps employees understand the management system, what additional information they need to manage and can generate for them accounting information service.The results of the author’s work are devoted to the problem of developing the structure of the concept of management accounting, as modern publications on this issue, in fact, are based on personal subjective ideas about management accounting models. Unfortunately, apart from general maxims regarding the organization and methods of accounting for costs and revenues in terms of structural units of the enterprise (cost centers), responsible persons (places or areas of responsibility), certain products and calculation methods, such publications do not provide any theoretical generalizations.It is time to develop, at least in the first version, the conceptual foundations of management accounting, given the typical structure of the information field, which can be adapted to the individual needs of specific enterprises.Perspectives for further research on the problems of management accounting are related to the definition of its boundaries and methods of regulation within the enterprise. This accounting should not be endowed with the prognostic function performed by strategic accounting in the controlling system. Its role is more modest - serving the information needs of managers of the operational level of management in real time.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Information systems philosophy, research methods and theory"

1

Bollou, Felix Afri. "Interrogating the impact of ICT infrastructure expansion in Francophone West Africa 1993-2005 : a critical theory study using archival data and non-parametric research methods." Doctoral thesis, University of Cape Town, 2010. http://hdl.handle.net/11427/10110.

Full text
Abstract:
Includes bibliographical references (leaves 192-209).
This thesis critically investigates the impact of Information and Communication Technology (ICT) infrastructure expansion on Development in Six West African Countries. While recent research has shown that ICT has contributed significantly to economic and social transformation in Western developed countries, the same is not necessarily true for less developed countries. After over a decade of heavy investment in ICT infrastructure expansion in Africa, little empirical research on the contribution of ICT to development has been conducted to assess the impact of these investments on the development of these countries. This work is a groundbreaking effort to advance a much needed research program to measure the impact of ICT infrastructure expansion on development in Africa.
APA, Harvard, Vancouver, ISO, and other styles
2

Warren, Scott Joseph. "A Multi-Methodology Study of the Historic Impact of Soft Systems Methodology and Its Associated Data Visualization Approach in the Context of Operations and Business Strategy." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404615/.

Full text
Abstract:
The purpose of this three-essay dissertation was to expand knowledge and theory regarding soft systems methodologies (SSMs) and data visualization approaches in business, engineering, and other social sciences. The first essay depicts a bibliometric analysis study of the historic impacts of SSM from 1980-2018 on business, engineering, and other social sciences fields. This study found 285 articles that described or employed SSM for research and included outcomes such as top SSM authors, author citation impacts, common dissemination outlets, time-bound distribution of publications, and other relevant findings. This study provided a picture of who, what, why, when, and where SSM has had the greatest impact on academic thought and practice. The second essay presents research on the academic impact of Systemigrams, an associated data visualization approach, finding examples of conceptual or research development that employed Systemigrams to depict complex problem situations. Recommendations for improvement of designing these data visualizations to increase their field use resulted from this study. The final essay leverages a selection of the articles as use cases to produce a grounded theory study to identify phenomena that arose from the use of SSM for operations and firm strategy research. This study identified two broad themes including (i) scope, structure, and process challenges and (ii) performance and evaluation limitations. These themes were explained by six patterns that emerged from the publications. Each produced change recommendations for SSM process, practice, and reporting to support its continued viability and adoption in business and operations research.
APA, Harvard, Vancouver, ISO, and other styles
3

Ozguner, Nimet Pinar. "Cevre Kale: Applications Of Newly Developed Methods, Technology And Data For Understanding The Iron Age City In Yarasli." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607164/index.pdf.

Full text
Abstract:
The purpose of this thesis is to test the validity of applications of Remote Sensing and Geographical Information Systems in Anatolian archaeology. The focus of the study is an Iron Age fortress Ç
evre Kale and its associated structures. During the course of the study, 5 km long outer wall enclosing a territory around Ç
evre Kale documented for the first time by employing high altitude aerial imagery. In addition to the GIS analyses, examination of the geology, land use and soil quality data showed that the outer wall is in a way acting to guard and protect inhabitants of the fortress and, perhaps more importantly, the well-watered pasture surrounding the fortress and demarcated by the enclosure wall. Evaluation of the available archaeological and historical evidence suggested that Ç
evre Kale might be of a site with significant military importance at least in the first half of the 6th century BC. As a result, this thesis is underlying the importance of high and low altitude aerial imagery in terms of documentation, evaluation and monitoring of the archaeological sites as part of the archaeological research
APA, Harvard, Vancouver, ISO, and other styles
4

Bates, Anthony Shawn. "The Trilogy of Science: Filling the Knowledge Management Gap with Knowledge Science and Theory." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3977.

Full text
Abstract:
The international knowledge management field has different ways of investigating, developing, believing, and studying knowledge management. Knowledge management (KM) is distinguished deductively by know-how, and its intangible nature establishes different approaches to KM concepts, practices, and developments. Exploratory research and theoretical principles have formed functional intelligences from 1896 to 2013, leading to a knowledge management knowledge science (KMKS) concept that derived a grounded theory of knowledge activity (KAT). This study addressed the impact of knowledge production problems on KM practice. The purpose of this qualitative meta-analysis study was to fit KM practice within the framework of knowledge science (KS) study. Themed questions and research variables focused on field mechanisms, operative functions, principle theory, and relationships of KMKS. The action research used by American practitioners has not established a formal structure for KS. The meta-data-analysis examined 385 transdisciplinary peer-reviewed articles using social science, service science, and systems science databases, with a selection of interdisciplinary studies that had a practice-research-theory framework. Key attributes utilizing Boolean limiters, words, phrases and publication dates, along with triangulation, language analysis and coding through analytic software identified commonalities of the data under study. Findings reflect that KM has not become a theoretically saturated field. KS as the forensic science of KM creates a paradigm shift, causes social change that averts rapid shifts in management direction and uncertainty, and connects KM philosophy and science of knowledge. These findings have social change implications by informing the work of managers and academics to generate a methodical applied science.
APA, Harvard, Vancouver, ISO, and other styles
5

Samwel, Emad. "Toward the Development and Implementation of Personalized, Adaptive, and Comprehensive E-learning Systems." Diss., NSUWorks, 2016. https://nsuworks.nova.edu/gscis_etd/373.

Full text
Abstract:
Enrollment in online courses is increasing at a much higher rate than enrollment in on campus courses. Initially, online systems were developed by moving course content from in-class courses as is to an online platform. Later, Web 2.0 technology was implemented in order to improve students’ online engagement. These systems considered all students as one homogeneous group and ignored the fact that different students learn in different ways and at different speeds. Later, adaptive online learning systems were developed based on the assumption that if the instructional approach matches the student learning style, student performance and experience will improve. The use of these systems yielded mixed results because there is no agreement on what, how, and when to adapt instructions. The problem is that there is still a lack of empirical evidence about which online learning system’ design is the most effective, efficient, and engaging. There were two goals for this study. The first was to develop a new instructional theory and design model suitable for personalizing and adapting online learning. The first goal was achieved by developing student personalized, adaptive, and comprehensive e-learning spaces instructional theory and design model. This theory is based on finding the best fit among student characteristics, knowledge domain objectives, and technology used in delivering the online course. The second goal was to implement the newly developed theory and design model in an e-learning system prototype. This goal was achieved by developing and internally validating the e-learning system prototype by utilizing a panel of five instructional design experts. The Delphi method was used to solicit input from the expert panel in three rounds of validation. The validation process resulted in the experts’ consensus that the prototype incorporated the instructional theory and design model well and that this instructional theory holds the promise of increasing online learning courses’ effectiveness, efficiency, and student engagement.
APA, Harvard, Vancouver, ISO, and other styles
6

(9822485), Chiranjivi Neupane. "Key determinants influencing stakeholders' trust towards their intention to adopt smart city services in Australian regional cities." Thesis, 2020. https://figshare.com/articles/thesis/Key_determinants_influencing_stakeholders_trust_towards_their_intention_to_adopt_smart_city_services_in_Australian_regional_cities/13410671.

Full text
Abstract:
This research developed a theoretical model to identify determinants influencing stakeholders’ trust towards their intention to adopt smart city services in regional Australian cities. Survey data were collected from ICT professionals working in regional Queensland cities in order to test the theoretical model.
APA, Harvard, Vancouver, ISO, and other styles
7

Albertyn, Erina Francina. "e-Process selection using decision making methods : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems at Massey University, Palmerston North, New Zealand." 2010. http://hdl.handle.net/10179/1662.

Full text
Abstract:
The key objective of this research is to develop a selection methodology that can be used to support and aid the selection of development processes for e-Commerce Information Systems (eCIS) effectively using various decision methods. The selection methodology supports developers in their choice of an e-Commerce Information System Development Process (e-Process) by providing them with a few different decision making methods for choosing between defined e-Processes using a set of quality aspects to compare and evaluate the different options. The methodology also provides historical data of previous selections that can be used to further support their specific choice. The research was initiated by the fast growing Information Technology environment, where e-Commerce Information Systems is a relatively new development area and developers of these systems may be using new development methods and have difficulty deciding on the best suited process to use when developing new eCIS. These developers also need documentary support for their choices and this research helps them with these decision-making processes. The e-Process Selection Methodology allows for the comparison of existing development processes as well as the comparison of processes as defined by the developers. Four different decision making methods, the Value-Benefit Method (Weighted Scoring), the Analytical Hierarchy Process, Case-Based Reasoning and a Social Choice method are used to solve the problem of selecting among e-Commerce Development Methodologies. The Value-Benefit Method, when applied to the selection of an e-Process from a set of e-Processes, uses multiple quality aspects. Values are assigned to each aspect for each of the e-Processes by experts. The importance of each of the aspects, to the eCIS, is defined in terms of weights. The selected e-Process is the one with the highest score when the values and weights are multiplied and then summed. The Analytic Hierarchy Process is used to quantify a selection of quality aspects and then these are used to evaluate alternative e-Processes and thus determining the best matching solution to the problem. This process provides for the ranking and determining of the relative worth of each of the quality aspects. Case-Based Reasoning requires the capturing of the resulting knowledge of previous cases, in a knowledge base, in order to make a decision. The case database is built in such a way that the concrete factual knowledge of previous individual cases that were solved previously is stored and can be used in the decision process. Case-based reasoning is used to determine the best choices. This allows the user to either use the selection methodology or the case base database to resolve their problems or both. Social Choice Methods are based on voting processes. Individuals vote for their preferences from a set of e-Processes. The results are aggregated to obtain a final result that indicates which e-Process is the preferred one. The e-Process Selection Methodology is demonstrated and validated by the development of a prototype tool. This tool can be used to select the most suitable solution for a case at hand. The thesis includes the factors that motivated the research and the process that was followed. The e-Process Selection Methodology is summarised as well as the strengths and weaknesses discussed. The contribution to knowledge is explained and future developments are proposed. To conclude, the lessons learnt and reinforced are considered.
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Tai-Yu. "Cognitive trait model for adaptive learning environments : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information System [i.e. Systems], Massey University, Palmerston North, New Zealand." 2007. http://hdl.handle.net/10179/1451.

Full text
Abstract:
Among student modelling researches, domain-independent student models have usually been a rarity. They are valued because of reusability and economy. The demand on domain-independent student models is further increased by the need to stay competitive in the so-called knowledge economy nowadays and the widespread practice of lifelong learning. On the other hand, the popularity of student-oriented pedagogy triggers the need to provide cognitive support in virtual learning environments which in turn requires student models that create cognitive profiles of students. This study offers an innovative student modelling approach called cognitive trait model (CTM) to address both the needs mentioned above. CTM is a domain-independent and persistent student model that goes beyond traditional concept of student model. It is capable of taking the role of a learning companion who knows about the cognitive traits of the student and can supply this information when the student first starts using a new learning system. The behaviour of the students in the learning systems can then be used to update CTM. Three cognitive traits are included in the CTM in this study, they are working memory capacity, inductive reasoning ability and divergent associative learning. For the three cognitive traits, their domain-independence and persistence are studied and defined, their characteristics are examined, and behaviour patterns that can be used to indicate them are extracted. In this study, a learning system is developed to gather behaviour data of students. Several web-based psychometric tools are also developed to gather the psychometric data about the three cognitive traits of students. In the evaluations, Cognitive trait modelling is then applied on the behaviour data and the results are compared with the psychometric data. The findings prove the effectiveness of CTM and reveal important insights about the three cognitive traits.
APA, Harvard, Vancouver, ISO, and other styles
9

Grobler, Chris Daniel. "A strategic theoretical framework to safeguard business value for information systems." Thesis, 2017. http://hdl.handle.net/10500/24724.

Full text
Abstract:
The phenomenon of business value dissipation in mature organisations as an unintended by-product of the adoption and use of information systems has been a highly debated topic in the corporate boardroom awakening the interest of practitioners and academics alike. Much of the discourse tends to focus on the inability of organisations to unlock and realise the intended benefits to be harvested through large information systems investments. While the business case for investing in large technology programmes has been thoroughly investigated, the human agent that causes value erosion through his interaction with information systems (IS), has not received the studied attention it deserves. This study examines the use of technology in organisations by considering the dichotomy inherent in IS where its introduction for the purposes of creating new or sustaining existing business value subsequently also inadvertently dissipates value. The study proceeds to investigate the root people-induced causes resulting in the unintentional dissipation of value and presents an empirically validated model suggesting that human agents do not only create value for organisations through their use of IS, but at the same time, deliberately or inadvertently, dissipate value. The root people-induced causes resulting in the unintentional dissipation of value is delineated within a Theoretical Technology Value Framework that is constructed from a review of the extant literature, and delineates the overall unintentional value destroying causes and effects of IS on organisations. The Theoretical Technology Value Framework is forthwith applied as a basis for the development of a set of questions to support both qualitative and quantitative investigations from which an Archetypical Technology Value Model was derived. Finally, an Archetypical Technology Value Model is presented as a benchmark and basis to identify, investigate, mitigate and minimise or eliminate the unintentional value destroying effects of IS on Information Technology driven organisations. The study concludes with implications for both theory and practice and suggestions on how value erosion through the activities of the human agent may be identified, modeled and mitigated. Ultimately, recommendations are offered towards the crafting of more effective IS.
School of Computing
Ph. D. (Information Systems)
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Information systems philosophy, research methods and theory"

1

1954-, Cater-Steel Aileen, and Al-Hakim Latif 1946-, eds. Information systems research methods, epistemology, and applications. Hershey PA: Information Science Reference, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Systems evaluation: Methods, models, and applications. Boca Raton, FL: CRC Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stahl, Bernd Carsten. Information systems: Critical perspectives. Abingdon: Routledge, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Parlar, Mahmut. Interactive Operations Research with Maple: Methods and Models. Boston, MA: Birkhäuser Boston, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lehmann, Harold P. A Baysian computer-based approach to the physician's use of the clinical research literature. Stanford, Calif: Dept. of Computer Science and Medicine, Stanford University, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stahl, Bernd Carsten. Information systems: Critical perspectives. Abingdon: Routledge, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International, Conference on Current Research Information Systems (7th :. Antwerp Belgium 2004). Putting the sparkle in the knowledge society: 7th International Conference on Current Research Information Systems. Leuven, Belgium: Leuven University Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nursing, caring, and complexity science: For human-environment well being. New York: Springer Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

From biology to sociopolitics: Conceptual continuity in complex systems. New Haven, Conn: Yale University Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kłopotek, Mieczysław A. Intelligent Information Processing and Web Mining: Proceedings of the International IIS: IIPWM'04 Conference held in Zakopane, Poland, May 17-20, 2004. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Information systems philosophy, research methods and theory"

1

Avison, David, and Julien Malaurent. "Is theory king?: questioning the theory fetish in information systems." In Formulating Research Methods for Information Systems, 213–37. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137509857_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Allen S., M. Lynne Markus, Ola Henfridsson, Deborah R. Compeau, Fernando Olivera, David Silverman, Shirley Gregor, Julien Malaurent, and David Avison. "Commentaries on the role of theory." In Formulating Research Methods for Information Systems, 238–97. London: Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137509857_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Osei-Bryson, Kweku-Muata, and Ojelanki Ngwenyama. "An Approach for Using Data Mining to Support Theory Development." In Advances in Research Methods for Information Systems Research, 23–43. Boston, MA: Springer US, 2013. http://dx.doi.org/10.1007/978-1-4614-9463-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hanseth, Ole, and Kalle Lyytinen. "Design Theory for Dynamic Complexity in Information Infrastructures: The Case of Building Internet." In Enacting Research Methods in Information Systems, 104–42. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29272-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Yan, Manoj Thomas, and Kweku-Muata Osei-Bryson. "Using Association Rules Mining to Facilitate Qualitative Data Analysis in Theory Building." In Advances in Research Methods for Information Systems Research, 79–91. Boston, MA: Springer US, 2013. http://dx.doi.org/10.1007/978-1-4614-9463-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Doolin, Bill, and Alan Lowe. "To Reveal Is to Critique: Actor-Network Theory and Critical Information Systems Research." In Enacting Research Methods in Information Systems: Volume 1, 83–101. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29266-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bonner, William Bill. "History and IS — Broadening Our View and Understanding: Actor-Network Theory as a Methodology." In Enacting Research Methods in Information Systems: Volume 1, 267–98. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29266-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Urquhart, Cathy, and Walter Fernández. "Using Grounded Theory Method in Information Systems: The Researcher as Blank Slate and Other Myths." In Enacting Research Methods in Information Systems: Volume 1, 129–56. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29266-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Seidel, Stefan, and Cathy Urquhart. "On Emergence and Forcing in Information Systems Grounded Theory Studies: The Case of Strauss and Corbin." In Enacting Research Methods in Information Systems: Volume 1, 157–209. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29266-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stott, Alistair, and Bouda Vosough Ahmadi. "Farm animal welfare: the future." In The economics of farm animal welfare: theory, evidence and policy, 173–90. Wallingford: CABI, 2020. http://dx.doi.org/10.1079/9781786392312.0173.

Full text
Abstract:
Abstract Science can help us understand what animals want and economics can provide the understanding of human motivation needed to deliver such wants. In our view, what needs further development in future is for economics and information/communication science and technology to channel awareness into appropriate action. This chapter elaborates on this idea by providing some illustrative examples. Focusing on animal health and welfare, it argues that there is much scope for improvement in profit and welfare on commercial farms simply by adopting the best disease management approach available. We also emphasize the importance of systems modelling and operations research (OR) in the future to ensure that animal welfare taps into the growing opportunities that developments in these methods are likely to bring. The chapter also argues that OR can provide a bridge between animal welfare science, economics and business to deliver improvements in animal welfare through food markets. The importance of big data and precision livestock farming in livestock production/reproduction, animal health and welfare, and the environmental impact of livestock production are also discussed. New genetic approaches to optimize livestock resilience and efficiency are highlighted. We argue that tackling difficult problems, such as sustainability (that encompasses animal welfare alongside environment and climate change), efficiency and resilience in farm animal production systems, is and will remain a vital focus of research in the agri-food sector. Research methods and governance still need to change to properly reflect this. It is envisaged that animal welfare will be affected by these developments and should, wherever appropriate, be explicitly considered.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information systems philosophy, research methods and theory"

1

Tate, Derrick, and Mats Nordlund. "Research Methods for Design Theory." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/dtm-21694.

Full text
Abstract:
Abstract This paper is about the development of design theory, about how research in design theory is — and should be — done. Important works in design theory since 1850 are identified. The current state of design as a pre-paradigm science is explained, motivating the need for a unifying view of design. Given the state of the field, a framework for design theory is presented, and a research process model is proposed as a scientific way of doing research in design theory. These are discussed in light of modern views in the philosophy of science and their criteria for theory evaluation and scientific progress. Research in design can be treated in a scientific manner, but this must be done from a sophisticated view of scientific practice, one with the proper criteria for evaluating progress: at the level of the research program.
APA, Harvard, Vancouver, ISO, and other styles
2

Peterson, Matthew, and Joshua D. Summers. "Recommended Methods Supporting Adoption of the Agile Philosophy for Hardware Development." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-70621.

Full text
Abstract:
Abstract The objective of this research is to understand the historical evolution of software development, identify desirable characteristics of methods supporting agile for hardware, and recommend potential methods enabling agile development of hardware products. As technology and markets change, product development increasingly operates in a volatile, uncertain, complex, and ambiguous (VUCA) environment. While originally applied to software development, organizations are starting to see opportunity in adapting the agile philosophy for hardware development. A comparison of philosophies is made between waterfall, spiral, and agile development. The historical evolutions of software development, after agile, including Continuous Integration Continuous Deployment (CICD), Development and Operations (DevOps), and Development Security and Operations (DevSecOps) is presented. Benefits and challenges in the application of agile methods for hardware are presented. Benefits include improvements in flexibility in response to change and soft factors such as team communication, transparency and commitment. However, many challenges still remain. These are grouped into theme areas including lack of product flexibility, difficulty in separating deliverables, challenges with breaking down tasks within a sprint, changes needed in culture and mindset, difficulty scaling beyond pilot programs, team distribution, and development of an integrated approach across the product lifecycle. Potential methods to aid in the adoption of agile for hardware are discussed using the phases of the hardware development lifecycle as a framework. Recommended methods include the adaptation of Model Based Systems Engineering (MBSE) for problem definition, the use of generative methods for design, the application of Virtual Reality (VR) for prototyping, leveraging additive manufacturing for production, and favoring software defined systems to help in operations. By reducing both the duration and person-hours, these methods enable higher iteration rates for hardware products needed for an agile philosophy. The paper concludes with a discussion on future research efforts supporting the enabling agile development of hardware.
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, J. J., X. Pei, S. Z. Li, Hai-jun Su, J. B. Hopkins, and M. L. Culpepper. "Type Synthesis Principle and Practice of Flexure Systems in the Framework of Screw Theory: Part II—Numerations and Synthesis of Complex Flexible Joints." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28794.

Full text
Abstract:
In recent years, the increasing of application requirements call for development of a variety of high-performance (e.g. large-displacement, high-precision) flexible joints. In this paper we demonstrate how to use the proposed methodology for the type synthesis of flexure systems given in the companion paper to synthesize concepts for complex flexible joints. According to the joint characteristics other than other flexure systems, a basic design philosophy and a general type synthesis process for flexible joints are presented firstly. The numerations and type synthesis for four commonly used flexible joint types, i.e. flexible revolute joints (FRJs), flexible translational joints (FTJs), flexible universal joints (FUJs), and flexible spherical joints (FSJs) are investigated in detail. As a result, not only a variety of known flexible joints are systematically surveyed and classified, but also are some new flexible joints developed. The output of this process is the derivation of a multiple of flexible joint concepts that would then be modeled and optimized by existing modeling and analysis methods.
APA, Harvard, Vancouver, ISO, and other styles
4

Reifsnider, Kenneth L. "Test Methods and Accelerated Testing for Life Prediction of Composite Systems." In ASME 1997 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/imece1997-0667.

Full text
Abstract:
Abstract If we wish to use a material for engineering purposes, we must answer three basic questions: how strong is the material, how stiff is the material, and how long will it last? Durability is defined by the answer to the third of these questions, and frequently takes the form of life prediction. The characteristics displayed by such a material under long-term conditions, such as resistance to creep, stress rupture, and fatigue, are quite different from, for example, metals. The life of composite systems is often determined by the accumulation of defects and damage, rather than by the occurrence or growth of such flaws. And the changes in stiffness and strength during that accumulation process may be quite large, of the order of 50 percent or more, before fracture occurs. Hence, it is necessary to consider large changes in the constitutive behavior of the materials if a representation or predictive model is to be constructed. Perhaps the greatest challenge associated with such an enterprise is the determination of the constitutive information that is needed to uniquely and completely define the long-term behavior of composite materials, especially under complex applied conditions, i.e., the determination of what to measure and how to measure it. This paper will address the question of how to construct mechanistic models and related experiments that provide an interpretative link between the fundamental mechanical, chemical, kinetic, and thermodynamic processes that control the long-term behavior of composite materials and the remaining strength and life that defines durability and damage tolerance of those materials. The paper begins with the premise that any coherent philosophy must include a systematic and consistent analytical representation of all processes that define the evolution of properties and performance and of the resulting local stress states and material states that determine remaining strength and life. For the present case, kinetic theory, in a generalized form, is used to make such a construct. Then, we add the premise that the analytical representation must be cast in terms of constitutive quantities that are independent variables, i.e., that can be measured in the laboratory with experiments that produce unique and clearly defined physical constants, and that a canonical set of such constants can be defined. Finally, we address the question of how to actually measure such constants. At the heart of this discussion is the question of feasibility. A philosophy and attending model that requires the measurement of vast arrays of physical constants is not likely to be of interest to the applied community. And experiments that require some significant fraction of a lifetime to conduct should be minimized, or avoided if possible. “Accelerated testing” is the quixotic answer to this constraint, but the acceleration of the controlling processes must be done with a complete knowledge of how they work and what an appropriate accelerating parameter is. The present paper will discuss these questions and offer examples of defining experiments, a general life prediction philosophy, and some accelerated test methods that enable the application of composite materials in this context.
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Jingjun, Shouzhong Li, Shusheng Bi, and Guanghua Zong. "Symmetry Design in Flexure Systems Using Kinematic Principles." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12385.

Full text
Abstract:
Inspiration for the creation of mechanical devices often comes from observing the natural structures and movements of living organisms. Understanding the wide use of modularity and compliance in nature may lead to the design of high-performance flexure systems or compliant devices. One of the most important nature-inspired paradigms for constructing flexure systems is based on the effective use of symmetry. With a rigid mathematical foundation called screw theory and Lie group. The research of this paper mainly focuses on: (i) Mathematical explanation or treatment of symmetry design wildly used in flexure systems, concerning with a series of topics such as the relationship between degree of freedom (DOF), constraint, overconstraint, decouple motion and symmetrical geometry, and How to guarantee the mobility unchanged when using symmetry design? (ii) A compliance-based analytical verification for demonstrating that the symmetry design can effectively improve accuracy and dynamic performances. (iii) The feasibility of improving accuracy performance by connecting symmetry design with the principle of elastic averaging. The whole content is organized around a case study, i.e. symmetrical design of 1-DOF translational flexure mechanisms. The results are intent to provide a rigid theoretical foundation and significant instruction for the symmetry design philosophy in flexure systems using kinematic principles.
APA, Harvard, Vancouver, ISO, and other styles
6

Jotsov, Vladimir. "Emotion-Aware Education and Research Systems." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3385.

Full text
Abstract:
An emotion-aware method KALEIDOSCOPE is presented in the paper. It consists of a visualization approach, a method for information transfer-by-sense and applied approaches to maintain a natural-style dialog. The combination is purposed to provoke and keep positive emotions in the user and to maintain his interest in the problem. The main goal of this paper is to show how different machine-done visualized patterns lead to student’s perceptions that can’t be represented or estimated by the machine and how this is helpful during the educational process. It is shown that dynamic information presentations are superior to static ones. Original evolving (dynamic) ontology applications have been introduced. It is shown that the creation and maintenance of such ontologies may be a rather complicated process. Essential principles of an educational process using KALEIDOSCOPE method are introduced. It is shown that high quality education systems are far away from monotonic presentation forms, and that they are rather close to contemporary research systems. Both education and research systems use a clear and thoroughly understandable dialog depending on user’s knowledge level. The considered education system is an active part of the human-computer dialog process. Instead of trying to estimate the user’s emotions we apply a set of logical data mining methods aiming at making the human-computed interaction emotion-aware. The educational part of the system is domain independent. Aiming to show domain independent approaches, the examples are introduced from Number Theory to language expressions and nonclassical logic applications. Applications are presented in the domain of Number Theory and IT information security systems.
APA, Harvard, Vancouver, ISO, and other styles
7

Blahova, Marta. "SECURING INFORMATION SYSTEMS USING FRACTAL GEOMETRY." In 22nd SGEM International Multidisciplinary Scientific GeoConference 2022. STEF92 Technology, 2022. http://dx.doi.org/10.5593/sgem2022/2.1/s07.11.

Full text
Abstract:
This article deals with the use of the principles of fractal geometry applicable in the field of cryptographic security of communication within information systems. The theory of the proposed solution is based on the field of iterative fractals created using the TEA (Time Escape Algorithm) algorithm. The introductory part deals with the issue of choosing a suitable category of fractals for the purpose of securing information systems. The next part deals with the issue of generation, analysis of fractal structures, which is a prerequisite for the implementation of the proposed encryption process. The outputs from the performed fractal analysis are also used for the decryption process. The methodology of testing the proposed solution against cryptanalytic methods is described here. In the final part, the individual elements of the proposed process were implemented using a programmed interface in C #. It continues by testing the resistance of the given encryption method to cryptanalytic methods. Statistical methods, analytical methods, and brute force attacks were used to investigate resilience. The acquired knowledge proved the usability of the proposed solution for the selected area of its use.aim of this research is to design a suitable design for a diagnosticdevice that will periodically monitor and record selected quantities in the device. The diagnostic equipment must be as flexible as possible, as the design will be applicable to all output electronic equipment of this project. This means that the diagnostic design can be applied to all control units, add-on modules or turnstile controllers. Each checked element contains different quantities that are valid for correct diagnostics. Therefore, there is a desire for a uniform design that can be customized based on the device. The main benefit is finding a way to secure data against unwanted retrieval of its content. The involvement of the branch of fractal geometry in the field of information security opens up new possibilities, given the different conception of fractals, in contrast to the objects of classical Euclidean or other geometry. The proposed system works with complex fractal structures, which can be described by relatively trivial equations, which allows using this system with high speed both for encoding the message and for its retrospective reconstruction. This fact opens the way to the use of the proposed system for information security even in devices with limited computing capacity. The system emphasizes resistance to cryptanalytic methods, such as brute force attack, statistical methods, or analytical methods.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Jun, Xin Guo, and Wu Zhao. "Research on Multi-Dimensional Information Service Oriented to Innovative Process Planning." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-71137.

Full text
Abstract:
Abstract The importance of process planning in manufacturing systems has been widely recognized. Process planning is a complex process with abundant information, intensive knowledge and miscellaneous experience, which leads to many challenges in its innovation. Innovation has been supported by innovative methods and information integration. However, the existing research on innovative design theory and information integration only focused on product design but rarely process planning. Therefore, it is urgent to study how to systematically use multi-dimensional information to influence process planning and realize innovative process design. An model for innovative process planning was proposed. And the general strategy of process innovation design was established. The process knowledge management and application methods were put forward, and the knowledge service system for innovative process was established. In order to support process innovation in practice, the framework of innovative process design service platform was established. Finally, a case is taken to illustrate the feasibility of the proposed method. The result shows that the proposed method can guide the designers to produce innovative process plans rapidly to solve the shortcomings of traditional process plans.
APA, Harvard, Vancouver, ISO, and other styles
9

Johnson, Jay T. "A Brief Investigation of Swarm Theory and Applications." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86525.

Full text
Abstract:
For the last half century scientists have been discovering the biological complexities of colonies of ants, termites, bees and other insects. Although these colonies are composed of individuals with limited physical and intellectual aptitude, the behavior of the system as a whole displays highly adaptive and intelligent behavior. As a result, in the last two decades, engineers have been pursuing methods to create artificial swarm intelligence and applying these concepts of complex swarming systems to traditional and novel engineering areas such as robotics, optimization algorithms, wireless networks, and military applications. In this paper, an overview of swarm theory research is provided, followed by a more in depth demonstration of swarm behaviors including swarm clustering, formation control and swarm motion.
APA, Harvard, Vancouver, ISO, and other styles
10

Jia, Fusheng, Xinyu Chen, and Renke He. "Conversational Interaction Design for shopping apps: Situational awareness theory." In Intelligent Human Systems Integration (IHSI 2023) Integrating People and Intelligent Systems. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002918.

Full text
Abstract:
Conversational interaction is crucial to the development of e-commerce. In order to meet the needs of users, more and more enterprises begin to build chatbots based on conversational interaction. Conversational chatbots are becoming more and more popular, gradually becoming the preferred way for users to communicate with enterprises. Chatbots can provide users with personalized experience and high-quality services. However, there is no complete and systematic design principle to guide the design of its new conversational interface interaction. Many designers have borrowed the methods of social chat software for their design, which is lack of pertinence and difficult to ensure the rationality of interaction. The academic research on the shopping behavior of chatbots is relatively few. Even the Taobao APP, which is frequently used at present, has not formed a good user experience in the design of conversational interaction. How to improve the experience of conversational interaction is an urgent research topic. From the perspective of user experience, the behavior mode, information expression and thinking mode displayed by conversational chatbots should conform to the thinking and behavior characteristics of users. The design of conversational interaction should pay special attention to user experience in addition to technical competition. The social shortcomings of e-commerce sites are a major obstacle to the growth of companies' online businesses, and there is a lot of distrust among users of such technologies. With the disappearance of the structure and formality of the session, the difficulty of maintaining a good user experience increases and the system loses control of the human-computer interaction experience. In most studies, the focus is on the usability of conversational interactions and the ability to identify user queries.This paper mainly discusses the application of context awareness theory in conversational interaction of shopping APP, proposes a conversational interaction design process of shopping APP based on context awareness model and KANO-AHP model, and explores and summarizes the user experience-oriented conversational interaction design strategy of shopping APP by obtaining user needs qualitatively and quantitatively. On the basis of the context awareness theory, the user's experience demand set of four dimensions of conversational interaction vision, interaction, function and emotion of shopping APP is obtained based on the context awareness model from three aspects of user context factors, product context factors and environmental context factors. The KANO model is used to screen and classify the obtained demand set. The hierarchical structure of conversational interactive user needs of shopping APP is obtained. Then combined with the analytic hierarchy process (AHP) to calculate the weight of each demand and order the importance, finally put forward the design strategy. Based on the situation perception theory and KANO-AHP model to analyze user needs, the design strategies and suggestions of conversational interactive experience of shopping APP are proposed from four aspects of user visual interface experience, functional experience, interactive experience and emotional experience. In particular, some strategies such as personality characteristics, high-context conversation mechanism and the same emotional feedback mechanism are proposed to improve the user experience and satisfaction of conversational interaction of shopping APP. However, this paper only conducts in-depth research on the user side of conversational interaction of shopping APP, and obtains various experience design principles based on users. However, in the process of shopping, it is usually the transaction between merchants and users, and the subsequent research should be carried out in combination with the experience needs of merchants, so as to balance users and merchants in terms of experience.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography